Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:32
Static task
static1
Behavioral task
behavioral1
Sample
69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html
-
Size
27KB
-
MD5
69273eab5a93b9dfed6963c1fa8cc39b
-
SHA1
e7c889680ade009174ff11d2ecea3b53cf038477
-
SHA256
1e443cd139ebe220d5a8fa78d78d84febd7d4138622d6cba100ea9f7acc88f73
-
SHA512
3fbe9e0d557d9c3b863a8aa344ce6030afb13fe3c2195656a39c87c41fd4d1e3f21f5c4f448a72c8e684d76908ed58adc7e7a832e45f650a3162df5e6a24fc47
-
SSDEEP
192:uwDkb5na+nQjxn5Q/dnQieoNnunQOkEntLPXnQTbnpnQ9eu8m6uFkmQl7MBIqnYx:HQ/yDkUkxSyzz
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB0668B1-189B-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5039f8bfa8acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000018f8765b7523e34d9c5d5abb13436a8100000000020000000000106600000001000020000000a81c3f0cb1f5c3e268945cbf86036b7fc2ce3331932a6f32b7653bb7d7aeb438000000000e8000000002000020000000785faba50cdc44702af69b2ae3301a978abb0796be422521123226c23b88e64d200000005ce7300f519b9e70220b1c4567245b700c8d87ad7f21b260a02d51bd4b2e7cac40000000b8c5eea99501684beabd363d4b7e707a5967a23cf1ff70a5c2effdaf3b7ddc236469bf70d95fbbd7362d38577ef9e93df0967798e3357c27e499efa96d409286 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 1160 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2336 iexplore.exe 2336 iexplore.exe 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE 1160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2336 wrote to memory of 1160 2336 iexplore.exe IEXPLORE.EXE PID 2336 wrote to memory of 1160 2336 iexplore.exe IEXPLORE.EXE PID 2336 wrote to memory of 1160 2336 iexplore.exe IEXPLORE.EXE PID 2336 wrote to memory of 1160 2336 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69273eab5a93b9dfed6963c1fa8cc39b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571b371e068eace547ef99a51944324b1
SHA1f4eb1ac3382f1cab3090eefe950612756c1a5e46
SHA25644d1cbee163c50e616dd2a1dee2746c068fd18eb48d52869294f794e08394d47
SHA512b3028e0b2d505eb91263f748a3127e7d45eb5ee3a044db0ececc471a70dd8c6476700817339467cbd574a0d9bf8d7508b20a9e71288c49ec9d527a6b13e4c265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2d1bf7691da4022bf057a84433fd954
SHA10c7e16c68f5da89e266821d5429d8876da9721f2
SHA256c48dac25639708344ec865e93cb7e52039b3dda702b60d7a7c86b06f54a5111c
SHA5129d59cd62db6ba3d84314c0be13df4d76dd21a042547a916287d99d8c95257b1ddf461eca2a24360b698a3be78a8264ff129a456244b5eb9a53ab7c0aedd55b1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ddcb6538b3d63c3d6b0439ad4f94347
SHA19c78893908d6bd4c79034a73299df62ca82ed9a1
SHA256078228c3ec656f2880df106d183de534668abfa815568ee5f5715696297b4ff3
SHA51254db6f6e75873e611635e7ade40873d30eccf70824b00891191e1b3d33fd681d73e3c6c72644480d0510500d73a72878d4c4403e968ecf4d322fcf34490a4745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9fa01a13a47a88ec987bf02cf58f524
SHA1e05fba8b8db49d7200f97f7d658b7557aa53054d
SHA25666a3fea5b7a4135433326d9d6342a24b30e0323373cb46cc8fa4a73719729d4a
SHA512a48e51269027b15a883007c0e81d23eaf33cea6f800d2aceef304c41c75e5e840ac56d7caaeff7d4ce0189fdfef32b6a9c9207225ef00cf3016db6703c1abe3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd96252d03e124a26ea358cb58b69a4
SHA1994394976e91c7551a45ffe452e335f3b66efa52
SHA25681de0499b1336a36a5c3047893e535444a9afe328babe5f4e053e2f9e84b08b8
SHA51289d42758ed14d30445e6a1a43fdae166aee0202032ff516d79c51000f1c6602376e235f20513f2478337455b832049c14ca805394d8d8b34ec7352084aa98565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5389e9c3a2e954190575df988bb66e14e
SHA177ddec5f134e37032ade1bbff25c722d2e2a9786
SHA25637c1f46ba0ad0fff63b0048ad7c737d9c8458e2b44a30a111f99650d8a550df3
SHA512ae1fc145c3e07ce625ca1037f8f571e98b190265e32406ba9df9b977790ce029ffe53ba4100b5a5123d9ad82967e4c870970ebba138b4e217bc0bde13f7b38aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559344d66150c46c61deaed9fdcece45d
SHA115f00fec62673f5614415013c49e4d7b2e3ad781
SHA25612e33faf6557f3bfaded02cc30bb949450f1b7b556c93740b473ce93bfe468e3
SHA51262d83592873893cfc11cfeff1b6b9f59fbfcfb1247473c775d299e9c9647ac22a204eace3faf7565cfbf59c4f80bd9edff6ba8898ddd8eeb0a8f4c96270b016a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2fbdbdd7c7f74f553c02ca5a81441e5
SHA14ffa499c7aa2d7c40fdebea37c954c98d9c78481
SHA2562935b5d3b154d7c2a010e5fed1e0cde430af37962b7661f0d27393fef749b45a
SHA5124189a031fc31ecbc8b77421c735a1cc4c3aabfc4fafb73d84f60def0489b2fbb6c5d6c7b02ff664f87298d6114bae119438a8b87e6a30e47e09905eb964eae9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e0ef82537bf75b8a6ea8b215b354589
SHA1ffd9b48d3953facb374c8612a1c6f8b1038ed64f
SHA2561a06bf3f8f9926d2908201c7b41ec0222d16d761bb45218ae3a47694e57a3e63
SHA51291eed279d46d0ce13f55cf58341c1629d865a6fdcb3141a2ffe0682f7460d066d2844003aa64e8c36923f3d309c8de340b01e8f710bab168d626f5fdc93b520c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522b2f153e81103cb937a87e6f04dea6c
SHA1a3271936b9e26cf5ffc0e06927e4df6ad3e4d4e8
SHA256ae07350b8af16802ad59f2683cea95b61b738db6a414d1a7c8f18348519fffa8
SHA512915c61b87b225b3fada12ab9dd16feca3750e8bd5771af27bf403da70729904997b42c6de5225496ecd97ee845af3109aaef3c94e61d6963cab64b0407df6a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425b6bdba06b7b41d3ba6e6c3ed7b62b
SHA1770ce79e3526ef213c80a329f3857b2b329e8f1e
SHA256e3f5af2e617c0ee043bddc01303cbaa2aaa3b3373a3054da7242d295eba3725d
SHA512d50d505064b3c8d2a6f055f1119dba44d161acffb28072d6dc7b7bfcba400856b495a2ab6a5c638343dc3ef6030978f42ac9ee640e4558f7bc352ea7c598a228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8ecdd4f70af0fcd07c189560c9fcf23
SHA16a69a7ebdb043468002907d96559a10af2628c1e
SHA2563f88fbef2b2d6eb42f1dd87900754c07ed23777e029ee7a4a88a597e6fb06223
SHA512fdb9437aca2237c8d5348532fa579f58c9c5d3cf416e8436e0032ca22320a85cd79401034c2681655b2c9e93105cba68a5cc8a7d05bd8b3b5a935f80cce254d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55309c2666e7d95b749a5681a1cd7b834
SHA14eae273d364589bb48b73cb06673613c615838b1
SHA256d263825c178568b1fe1734182d9de1e802031400a60ba5792fb8a3d2db692f45
SHA512a886528234411aaac1898b8e3584200079a7cafeee4117361004efaa35d40e78b76c042783e24232c9b10b214b70c83ad2c1e31010a0f8e7b22325271032fcd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b536f06fcff13a3f2dbfe27e140c4663
SHA196f00dab403499213e4759e117c488b1c5a59853
SHA256ac3c675ec7f89fd041c0e6d2f7dce351e295572bec336a87d74ace6244a23351
SHA51223e3a0ab263b57f5514798c5d236a0b26e85d46a60f23638481d3ce9d59520aef31f5e9644a436354cd93f71e887547560f996214065e0144a6fb554575467ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cb1e9d005621002ac4baf5237fc2a13
SHA1f93b83747944ae97b6c6fb39a5999dd0da9f2341
SHA25636d18a7e41d6c2449b3537575e817731141a6e6fbfde23481e534571abfe26e3
SHA512551ae324940e6b4cd0c1e60f03e97c07eecad15eebab661410fdb50527c182edb54d14a05ca0accde2f3583dea2da7952d46d609e0e3bf5fbdaa0cdd64c9f2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a8231f5363e3a3d0f8ae4268d5b9457
SHA1d7bfdd85835db34a9dcd54e1491a770e27cf24c3
SHA25692e22d222b0f7298bae240e96bac88cbba146be36471cb5b600788728d8434f0
SHA5125401427957b5c9f83fe0a23b5036aebd3e94d10608d8813271452d75f8b945fad9c9bba0ef2dd6e1232b25cfe5d23fa22c1cd297d510fb69d31e07591ccdf92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585d16efaa29b05c514b74ab0747ec5fe
SHA13e7d36d9ec72d7a9fac97f5ef25b90430bf68013
SHA2567ffce67404449098a6c36e5de5d8bf69d7c28fd3f37136efdaa05f44e9cacd5e
SHA512d48b0b460370a3b6b9341c94e45585685db92e946255e715d3b9532803b51f2ced53ef998b0e9a7b851221cf02b1922e14d265c9173ab36ff71c378d408b86b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1abb43528414318c4e94bd3ad7354c0
SHA15d03e207fe232dec473df9a6d94af06a8483f898
SHA256bde088b8cc1a5060d00669d9fe5bce413fac790a6d1545449bb32bfc53aa4f72
SHA512ecb9e6d46f2efd5674cac6a22d8419845074eb6533001d3834d293065c98275f48e685fbdd7376afc06f291bbb614526e7c094da51603f6dffcbbc0831b137fc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a